Page 9 of 214 results (0.009 seconds)

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

"Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions. Vulnerabilidad de estilo "hacer añicos" en la interfaz de programación de aplicación (API) de Administración de Windows en Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales ganar privilegios usando ciertas funciones de API para cambiar las propiedades de programas privilegiados usando las funciones de API SetWindowLong y SetWIndowLongPtr. • http://marc.info/?l=bugtraq&m=109777417922695&w=2 http://www.kb.cert.org/vuls/id/218526 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16579 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. El subsistema de Máquina Virtual DOS de Microsoft Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales acceder a memoria del kernel y ganar privilegios mediante un programa malicioso que modifica ciertas estructuras de sistema de manera que no es validado adecuadamente por funciones privilegiadas del sistema operativo. • http://marc.info/?l=bugtraq&m=109772135404427&w=2 http://www.kb.cert.org/vuls/id/910998 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16580 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1751 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3161 https://oval.cisecurity.org/re •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values. La librería de tiempo de ejecución RPC de Microsoft Windows NT 4.0 permite a atacantes remotos leer la memoria activa o causar una denegación de servicio (caída del sistema) mediante un mensaje malicioso, posiblemente relacionado con valores de longitud inapropiados. • http://marc.info/?l=bugtraq&m=109769394209518&w=2 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-029 https://exchange.xforce.ibmcloud.com/vulnerabilities/17646 https://exchange.xforce.ibmcloud.com/vulnerabilities/17663 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2505 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5277 •

CVSS: 10.0EPSS: 94%CPEs: 5EXPL: 1

The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. El componente de Protocolo de Transferencia de Noticias de Red (NNTP) de Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, y Exchange Server 2003 permite a atacantes remtos ejecutar código de su elección mediante patrones XPAT, posiblemente relacionado con una validación de longitud inadecuada o un "búfer sin comprobar", conduciendo a desbordamientos de búfer basados en la pila y error de fuera por uno. • https://www.exploit-db.com/exploits/578 http://marc.info/?l=bugtraq&m=109761632831563&w=2 http://www.ciac.org/ciac/bulletins/p-012.shtml http://www.coresecurity.com/common/showdoc.php?idx=420&idxseccion=10 http://www.kb.cert.org/vuls/id/203126 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036 https://exchange.xforce.ibmcloud.com/vulnerabilities/17641 https://exchange.xforce.ibmcloud.com/vulnerabilities/17661 https://oval.cisecurity.org/repository/s • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 77%CPEs: 18EXPL: 0

Double free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image. mshtml.dll de ciertas versiones de Internet Explorer 6.x permite a atacantes remotos causar una denegación de servicio (caída de aplicación) y posiblemente ejecutar código arbitrario mediante una imagen GIF malformada que dispara un desbordamiento de búfer. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009445.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009473.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009506.html http://www.ciac.org/ciac/bulletins/o-191.shtml http://www.kb.cert.org/vuls/id/685364 http://www.securityfocus.com/bid/8530 http://www.us-cert.gov/cas/techalerts/TA04-212A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/200 • CWE-415: Double Free •